Next Article in Journal
Behavior of Sedimentary Rock Tunnel against Rigid Projectile Impact
Next Article in Special Issue
A Novel Deep Learning Approach for Deepfake Image Detection
Previous Article in Journal
Tennis Attack: An Exergame Utilizing a Natural User Interface to Measure and Improve the Simple Reaction Time
Previous Article in Special Issue
Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT Datasets Using DL in Cybersecurity for IoT
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(19), 9593; https://doi.org/10.3390/app12199593
Action Date Notes Link
article pdf uploaded. 24 September 2022 11:34 CEST Version of Record https://www.mdpi.com/2076-3417/12/19/9593/pdf-vor
article xml file uploaded 27 September 2022 06:15 CEST Original file -
article xml uploaded. 27 September 2022 06:15 CEST Update -
article pdf uploaded. 27 September 2022 06:16 CEST Updated version of record https://www.mdpi.com/2076-3417/12/19/9593/pdf-vor
article html file updated 27 September 2022 06:17 CEST Original file -
article html file updated 27 September 2022 10:04 CEST Update -
article xml file uploaded 29 September 2022 09:48 CEST Update -
article xml uploaded. 29 September 2022 09:48 CEST Update https://www.mdpi.com/2076-3417/12/19/9593/xml
article pdf uploaded. 29 September 2022 09:48 CEST Updated version of record https://www.mdpi.com/2076-3417/12/19/9593/pdf
article html file updated 29 September 2022 09:49 CEST Update https://www.mdpi.com/2076-3417/12/19/9593/html
Back to TopTop